Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths
Path authentication thwarts counterfeits in RFID-based supply chains. Its motivation is that tagged products taking invalid paths are likely faked and injected by adversaries at certain supply chain partners/steps. Existing solutions are path-grained in that they simply regard a product as genuine i...
Saved in:
Main Authors: | BU, Kai, LI, Yingjiu |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3859 https://ink.library.smu.edu.sg/context/sis_research/article/4861/viewcontent/08089353__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths
by: BU, Kai, et al.
Published: (2017) -
Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths
by: BU, Kai, et al.
Published: (2017) -
Two-level Path Authentication in EPCglobal Network
by: WANG, Hongbing, et al.
Published: (2012) -
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
by: LIANG, Bing, et al.
Published: (2009) -
A survey on privacy frameworks for RFID authentication
by: SU, Chunhua, et al.
Published: (2012)